On 30.10.2014 19:11, Tom Horsley wrote:
...
> does. Also the default libvirtd service starts a bunch of
> networking things for providing a default network that includes
> some firewall tinkering (or used to, anyway).
>
$ rpm -qil libvirt-daemon-config-nwfilter
Only for virtual network, therefore
On 10/31/14 11:37, Tim wrote:
> Allegedly, on or about 31 October 2014, Ed Greshko sent:
>> I've not used iptables service for a long time
>>
>> I don't recall if starting certain services open ports on their own.
> I've never seen that. That sort of (dynamic) behaviour is what
> firewalld is
Allegedly, on or about 31 October 2014, Ed Greshko sent:
> I've not used iptables service for a long time
>
> I don't recall if starting certain services open ports on their own.
I've never seen that. That sort of (dynamic) behaviour is what
firewalld is supposed to do. I could see the sen
On 10/31/14 11:29, jd1008 wrote:
>
> On 10/30/2014 08:51 PM, Ed Greshko wrote:
>> netstat -tnap | grep 53 | grep -i listen
>> netstat -tnap | grep 67 | grep -i listen
> tcp0 0 0.0.0.0:53 0.0.0.0:* LISTEN
> 3591/dnsmasq
> tcp6 0 0 :::53 :::*
On 10/30/2014 08:51 PM, Ed Greshko wrote:
netstat -tnap | grep 53 | grep -i listen
netstat -tnap | grep 67 | grep -i listen
tcp0 0 0.0.0.0:53 0.0.0.0:* LISTEN
3591/dnsmasq
tcp6 0 0 :::53 :::*LISTEN 3591/dnsmasq
tcp0
On 10/31/14 10:30, jd1008 wrote:
> I disabled firewalld and rebooted. Still ...
>
> # iptables -L -n
> Chain INPUT (policy DROP)
> target prot opt source destination
> ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0udp dpt:53
> ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0tcp dpt:53
>
On 10/30/2014 07:59 PM, Ed Greshko wrote:
On 10/31/14 09:51, jd1008 wrote:
# systemctl status firewalld.service
firewalld.service - firewalld - dynamic firewall daemon
Loaded: loaded (/usr/lib/systemd/system/firewalld.service; enabled)
Active: inactive (dead) since Thu 2014-10-30 19:44:
On 10/31/14 09:51, jd1008 wrote:
> # systemctl status firewalld.service
> firewalld.service - firewalld - dynamic firewall daemon
>Loaded: loaded (/usr/lib/systemd/system/firewalld.service; enabled)
>Active: inactive (dead) since Thu 2014-10-30 19:44:22 MDT; 4min 2s ago
> Main PID: 659 (co
On 10/30/2014 07:11 PM, Ed Greshko wrote:
On 10/31/14 09:04, jd1008 wrote:
On 10/30/2014 05:12 PM, Ed Greshko wrote:
On 10/31/14 02:11, Tom Horsley wrote:
On Thu, 30 Oct 2014 12:00:28 -0600
jd1008 wrote:
Why is this taking place?
Lots of things fiddle with iptables rules.
If you have the
On 10/31/14 09:04, jd1008 wrote:
>
> On 10/30/2014 05:12 PM, Ed Greshko wrote:
>> On 10/31/14 02:11, Tom Horsley wrote:
>>> On Thu, 30 Oct 2014 12:00:28 -0600
>>> jd1008 wrote:
>>>
Why is this taking place?
>>> Lots of things fiddle with iptables rules.
>>>
>>> If you have the new firewalld se
On 10/30/2014 05:12 PM, Ed Greshko wrote:
On 10/31/14 02:11, Tom Horsley wrote:
On Thu, 30 Oct 2014 12:00:28 -0600
jd1008 wrote:
Why is this taking place?
Lots of things fiddle with iptables rules.
If you have the new firewalld service running, God knows what it
does. Also the default libvi
On 10/31/14 02:11, Tom Horsley wrote:
> On Thu, 30 Oct 2014 12:00:28 -0600
> jd1008 wrote:
>
>> Why is this taking place?
> Lots of things fiddle with iptables rules.
>
> If you have the new firewalld service running, God knows what it
> does. Also the default libvirtd service starts a bunch of
> n
On 10/30/2014 12:11 PM, Tom Horsley wrote:
On Thu, 30 Oct 2014 12:00:28 -0600
jd1008 wrote:
Why is this taking place?
Lots of things fiddle with iptables rules.
If you have the new firewalld service running, God knows what it
does. Also the default libvirtd service starts a bunch of
networki
On Thu, 30 Oct 2014 12:00:28 -0600
jd1008 wrote:
> Why is this taking place?
Lots of things fiddle with iptables rules.
If you have the new firewalld service running, God knows what it
does. Also the default libvirtd service starts a bunch of
networking things for providing a default network tha
These are the rules being added that I do not care for:
# iptables -L -n
Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0udp dpt:53
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0tcp dpt:53
ACCEPT udp -- 0.0.0.0/0 0.0.0
15 matches
Mail list logo